Composite Security Boundary Visualization

نویسندگان

  • Guozhong Zhou
  • James D. McCalley
چکیده

| Based on a recently developed security assessment methodology using automatic training data generation software and neural networks, a composite security boundary visualization approach is proposed for power system operations. This approach can draw a single continuous boundary given multiple individual security problems. It can be conveniently accessed on-line and can be easily integrated into the energy management system (EMS). Examples are given for demonstration of the eeectiveness of the proposed approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genetic-based Feature Selection Applied to Neural Networks for Security Boundary Visualization

Knowledge of security boundaries is becoming more and more important as transmission lines are operating closer and closer to their capacities in today's deregulated environment. On-line visualization of security boundaries using intelligent techniques provides an eeective methodology for this problem. Feature selection , i.e., critical parameter selection, is one of the most essential techniqu...

متن کامل

On-Line Visualization of Security Boundaries Using Neural Networks with Feature Selection

| Knowledge of security boundaries in terms of easily monitorable operating parameters is becoming more and more important as power systems are operating close to their capabilities in today's deregulated environment. On-line visualization of security boundaries using intelligent techniques provides an eeective methodology for this problem. This paper presents further development on this method...

متن کامل

Free and Forced Vibration Analysis of Composite Laminated Conical Shells under Different Boundary Conditions Via Galerkin Method

In this paper, natural frequency and response of forced vibration of composite laminated conical shells under different boundary conditions are investigated. To this end, equations of Donnell's thin shell theory are used as governing equations. The analytical Galerkin method together with beam mode shapes as weighting functions is employed to solve the problem. Due to importance of boundary con...

متن کامل

Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach

Internet attacks area unit on the increase and create serious security threats to enterprise networks, industrial websites and to the lots of home web users. Web attacks have become less assailable and complicated with time. Network traffic visualization tools have with successfully enabled security analysts to know the character of traffic gift in a very network. Conversely, these tools believ...

متن کامل

A PMU-Based Method for Smart Transmission Grid Voltage Security Visualization and Monitoring

With the rapid growth of usage of phasor measurement units (PMUs) for modern power grids, the application of synchronized phasors (synchrophasors) to real-time voltage security monitoring has become an active research area. This paper presents a novel approach for fast determination of loading margin using PMU data from a wide-area monitoring system (WAMS) to construct the voltage stability bou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997